Giampaolo Bella

Orcid: 0000-0002-7615-8643

Affiliations:
  • University of Catania, Italy


According to our database1, Giampaolo Bella authored at least 134 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Behind the (Digital Crime) Scenes: An MSC Model.
CoRR, 2024

2023
PETIoT: PEnetration Testing the Internet of Things.
Internet Things, July, 2023

The ontology for agents, systems and integration of services: OASIS version 2<sup>$</sup>.
Intelligenza Artificiale, 2023

The Ontology for Agents, Systems and Integration of Services: OASIS version 2.
CoRR, 2023

The AILA Methodology for Automated and Intelligent Likelihood Assignment in Risk Assessment.
IEEE Access, 2023

How to Model Privacy Threats in the Automotive Domain.
Proceedings of the 9th International Conference on Vehicle Technology and Intelligent Transport Systems, 2023

Smart Bulbs Can Be Hacked to Hack into Your Household.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

A Behaviouristic Approach to Representing Processes and Procedures in the OASIS 2 Ontology.
Proceedings of the Joint Ontology Workshops 2023 Episode IX: The Quebec Summer of Ontology co-located with the 13th International Conference on Formal Ontology in Information Systems (FOIS 2023), 2023

An Automated Method for the Ontological Representation of Security Directives.
Proceedings of the Joint Ontology Workshops 2023 Episode IX: The Quebec Summer of Ontology co-located with the 13th International Conference on Formal Ontology in Information Systems (FOIS 2023), 2023

An Ontological Approach to Compliance Verification of the NIS 2 Directive.
Proceedings of the Joint Ontology Workshops 2023 Episode IX: The Quebec Summer of Ontology co-located with the 13th International Conference on Formal Ontology in Information Systems (FOIS 2023), 2023

Evaluating the Fork-Awareness of Coverage-Guided Fuzzers.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

A Threat Model for Soft Privacy on Smart Cars.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Protecting Voice-Controllable Devices Against Self-Issued Voice Commands.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Up-to-Date Threat Modelling for Soft Privacy on Smart Cars.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

The VOCODES Kill Chain for Voice Controllable Devices.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Towards Grammatical Tagging for the Legal Language of Cybersecurity.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Modelling human threats in security ceremonies.
J. Comput. Secur., 2022

Multi-service threats: Attacking and protecting network printers and VoIP phones alike.
Internet Things, 2022

Embedded fuzzing: a review of challenges, tools, and solutions.
Cybersecur., 2022

Attacking and Protecting Network Printers and VoIP Phones alike.
CoRR, 2022

Vulnerability Assessment and Penetration Testing on IP cameras.
CoRR, 2022

Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security.
Comput. Networks, 2022

The ontology for agents, systems and integration of services: recent advancements of OASIS.
Proceedings of the 23rd Workshop "From Objects to Agents", 2022

Interactional Freedom and Cybersecurity.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022

Papyrus-Based Safety Analysis Automatization.
Proceedings of the 6th International Conference on System Reliability and Safety, 2022

The AILA Methodology for Automated and Intelligent Likelihood Assignment.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

ALEXA VERSUS ALEXA: Controlling Smart Speakers by Self-Issuing Voice Commands.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Out to Explore the Cybersecurity Planet.
CoRR, 2021

Secure Routine: A Routine-Based Algorithm for Drivers Identification.
CoRR, 2021

Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version).
CoRR, 2021

SixPack: Abusing ABS to avoid Misbehavior detection in VANETs.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Car Drivers' Privacy Concerns and Trust Perceptions.
Proceedings of the Trust, Privacy and Security in Digital Business, 2021

Towards the COSCA framework for "COnseptualing Secure CArs".
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, Juni 1-2, 2021., 2021

Vulnerability Assessment and Penetration Testing on IP camera.
Proceedings of the 8th International Conference on Internet of Things: Systems, 2021

Blockchains Through Ontologies: The Case Study of the Ethereum ERC721 Standard in oasis.
Proceedings of the Intelligent Distributed Computing XIV, 2021

Semantic Representation as a Key Enabler for Blockchain-Based Commerce.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2021

Privacy and modern cars through a dual lens.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

2020
VoIP Can Still Be Exploited - Badly.
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020

CINNAMON: A Module for AUTOSAR Secure Onboard Communication.
Proceedings of the 16th European Dependable Computing Conference, 2020

2019
Are you secure in your car?: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

You Already Used Formal Methods but Did Not Know It.
Proceedings of the Formal Methods Teaching - Third International Workshop and Tutorial, 2019

You Overtrust Your Printer.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Implementing CAN bus security by TOUCAN.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019

What Are the Threats? (Charting the Threat Models of Security Ceremonies).
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

An Investigation into the "Beautification" of Security Ceremonies.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

TOUCAN: A proTocol tO secUre Controller Area Network.
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019

2018
Invalid certificates in modern browsers: A socio-technical analysis.
J. Comput. Secur., 2018

Towards an Integrated Penetration Testing Environment for the CAN Protocol.
Proceedings of the Computer Safety, Reliability, and Security, 2018

Getmewhere: A Location-Based Privacy-Preserving Information Service.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

2017
Trustworthy exams without trusted parties.
Comput. Secur., 2017

Analysing Privacy Analyses.
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017

Idea: A Unifying Theory for Evaluation Systems.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

2016
Invisible Security.
Proceedings of the Security Protocols XXIV, 2016

Invisible Security (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016

2015
Service security and privacy as a socio-technical problem.
J. Comput. Secur., 2015

Special issue on the Security Track at the ACM Symposium on Applied Computing 2013.
Int. J. Inf. Sec., 2015

Security is Beautiful.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

A Secure Exam Protocol Without Trusted Parties.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
Inductive study of confidentiality: for everyone.
Formal Aspects Comput., 2014

Secure exams despite malicious management.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

A Socio-technical Methodology for the Security and Privacy Analysis of Services.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

The Challenges behind Independent Living Support Systems.
Proceedings of the Active Media Technology - 10th International Conference, 2014

2013
Enhancing DSR maintenance with power awareness.
Comput. Stand. Interfaces, 2013

Socio-technical formal analysis of TLS certificate validation in modern browsers.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

A Socio-technical Understanding of TLS Certificate Validation.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

Towards Verifying Voter Privacy through Unlinkability.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

What security for electronic exams?
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
Inductive Study of Confidentiality.
Arch. Formal Proofs, 2012

Foreword from the Workshop Chairs - STAST 2012.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

Verifying Privacy by Little Interaction and No Process Equivalence.
Proceedings of the SECRYPT 2012, 2012

Layered Analysis of Security Ceremonies.
Proceedings of the Information Security and Privacy Research, 2012

Specifying security requirements of context aware system using UML.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

2011
Multi-Attacker Protocol Validation.
J. Autom. Reason., 2011

Enforcing privacy in e-commerce by balancing anonymity and trust.
Comput. Secur., 2011

Internet Users' Security and Privacy While They Interact with Amazon.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Remote Management of Face-to-face Written Authenticated Though Anonymous Exams.
Proceedings of the CSEDU 2011, 2011

Holistic analysis of mix protocols.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
The principle of guarantee availability for security protocol analysis.
Int. J. Inf. Sec., 2010

Virtually Perfect Democracy.
Proceedings of the Security Protocols XVIII, 2010

WATA - A System for Written Authenticated though Anonymous Exams.
Proceedings of the CSEDU 2010 - Proceedings of the Second International Conference on Computer Supported Education, Valencia, Spain, April 7-10, 2010, 2010

2009
Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing.
J. Comput. Secur., 2009

Attacking Each Other.
Proceedings of the Security Protocols XVII, 2009

Validating Security Protocols under the General Attacker.
Proceedings of the Foundations and Applications of Security Analysis, 2009

Formal Analysis of the Genetic Toggle.
Proceedings of the Computational Methods in Systems Biology, 7th International Conference, 2009

2008
What is Correctness of Security Protocols?
J. Univers. Comput. Sci., 2008

Security Protocol Deployment Risk.
Proceedings of the Security Protocols XVI, 2008

Special track on Computer Security: editorial message.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Realistic Threats to Self-Enforcing Privacy.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

Managing Reputation over MANETs.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Formal Correctness of Security Protocols - With 62 Figures and 4 Tables
Information Security and Cryptography, Springer, ISBN: 978-3-540-68134-2, 2007

2006
Accountability protocols: Formalized and verified.
ACM Trans. Inf. Syst. Secur., 2006

Verifying the SET Purchase Protocols.
J. Autom. Reason., 2006

Augmented Risk Analysis.
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006

Editorial message: special track on computer security.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

2005
Guest Editors' preface.
J. Comput. Secur., 2005

An overview of the verification of SET.
Int. J. Inf. Sec., 2005

Information Assurance for security protocols.
Comput. Secur., 2005

Special track on computer security.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Locating Mobile Nodes Within Logical Networks.
Proceedings of the 2005 International Conference on Pervasive Systems and Computing, 2005

2004
Soft Constraint Programming to Analysing Security Protocols.
Theory Pract. Log. Program., 2004

Distributed Backup through Information Dispersal.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

Soft Constraints for Security.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

Special Issue: Computer Security.
Concurr. Pract. Exp., 2004

Editoral message: special track on computer security.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Should We Prove Security Policies Correct?
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004

2003
Verifying the SET registration protocols.
IEEE J. Sel. Areas Commun., 2003

Inductive Verification of Smart Card Protocols.
J. Comput. Secur., 2003

Verifying Second-Level Security Protocols.
Proceedings of the Theorem Proving in Higher Order Logics, 16th International Conference, 2003

Is the Verification Problem for Cryptographic Protocols Solved?.
Proceedings of the Security Protocols, 2003

Biometrics to Enhance Smartcard Security.
Proceedings of the Security Protocols, 2003

A Protocol's Life After Attacks....
Proceedings of the Security Protocols, 2003

A Protocol's Life After Attacks... (Discussion).
Proceedings of the Security Protocols, 2003

Computer Security Track Editorial.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Availability of Protocol Goals.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

2002
Analyzing Delegation Properties.
Proceedings of the Security Protocols, 2002

Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks.
Proceedings of the Security Protocols, 2002

Editorial Message: special track on computer security.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Interactive simulation of security policies.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

The verification of an industrial payment protocol: the SET purchase phase.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Mechanical Proofs about a Non-repudiation Protocol.
Proceedings of the Theorem Proving in Higher Order Logics, 14th International Conference, 2001

A Proof of Non-repudiation.
Proceedings of the Security Protocols, 2001

Soft Constraints for Security Protocol Analysis: Confidentiality.
Proceedings of the Practical Aspects of Declarative Languages, 2001

Mechanising a Protocol for Smart Cards.
Proceedings of the Smart Card Programming and Security, 2001

2000
Inductive verification of cryptographic protocols
PhD thesis, 2000

Making Sense of Specifications: The Formalization of SET.
Proceedings of the Security Protocols, 2000

Lack of Explicitness Strikes Back (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

Lack of Explicitness Strikes Back.
Proceedings of the Security Protocols, 2000

Formal Verification of Cardholder Registration in SET.
Proceedings of the Computer Security, 2000

1999
Modelling Agents' Knowledge Inductively.
Proceedings of the Security Protocols, 1999

1998
Kerberos Version 4: Inductive Analysis of the Secrecy Goals.
Proceedings of the Computer Security, 1998

Mechanising BAN Kerberos by the Inductive Method.
Proceedings of the Computer Aided Verification, 10th International Conference, 1998

A Realistic Environment for Crypto-Protocol Analyses by ASMs.
Proceedings of the Fifth International Workshop on Abstract State Machines, 1998

1997
Formal Analysis of the Kerberos Authentication System.
J. Univers. Comput. Sci., 1997


  Loading...